{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:28:27Z","timestamp":1725593307471},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642221996"},{"type":"electronic","value":"9783642222009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22200-9_24","type":"book-chapter","created":{"date-parts":[[2011,6,25]],"date-time":"2011-06-25T23:52:53Z","timestamp":1309045973000},"page":"300-311","source":"Crossref","is-referenced-by-count":1,"title":["Assessment of the Trustworthiness of Digital Records"],"prefix":"10.1007","author":[{"given":"Jianqiang","family":"Ma","sequence":"first","affiliation":[]},{"given":"Habtamu","family":"Abie","sequence":"additional","affiliation":[]},{"given":"Torbj\u00f8rn","family":"Skramstad","sequence":"additional","affiliation":[]},{"given":"Mads","family":"Nyg\u00e5rd","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/3-540-48749-2_8","volume-title":"Secure Internet Programming","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Ryan, M. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 183\u2013210. Springer, Heidelberg (1999)"},{"issue":"2","key":"24_CR2","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s10502-007-9058-2","volume":"7","author":"F. Boudrez","year":"2007","unstructured":"Boudrez, F.: Digital singatures and electronic records. Archival Science\u00a07(2), 179\u2013193 (2007)","journal-title":"Archival Science"},{"key":"24_CR3","unstructured":"Center for Research Libraries: Trustworthy repositories audit & certification: Criteria and checklist (2008), http:\/\/www.crl.edu\/PDF\/trac.pdf"},{"issue":"6","key":"24_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MIC.2005.123","volume":"9","author":"T.M. Chen","year":"2005","unstructured":"Chen, T.M., Venkataramanan, V.: Dempster-Shafer theory for intrusion detection in ad hoc networks. IEEE Internet Computing\u00a09(6), 35\u201341 (2005)","journal-title":"IEEE Internet Computing"},{"key":"24_CR5","unstructured":"Consultative Committee for Space Data Systems: Reference model for an open archival information system (OAIS) (2002)"},{"key":"24_CR6","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1214\/aoms\/1177698950","volume":"38","author":"A.P. Dempster","year":"1967","unstructured":"Dempster, A.P.: Upper and lower probabilities induced by a multivalued mapping. Annals of Mathematical Statistics\u00a038, 325\u2013339 (1967)","journal-title":"Annals of Mathematical Statistics"},{"issue":"3","key":"24_CR7","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1145\/1010614.1010617","volume":"22","author":"H.M. Gladney","year":"2004","unstructured":"Gladney, H.M.: Trustworthy 100-year digital objects: Evidence after every witness is dead. ACM Transaction on Information System (TOIS)\u00a022(3), 406\u2013436 (2004)","journal-title":"ACM Transaction on Information System (TOIS)"},{"issue":"3","key":"24_CR8","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/1080343.1080346","volume":"23","author":"H.M. Gladney","year":"2005","unstructured":"Gladney, H.M., Lorie, R.A.: Trustworthy 100-year digital objects: durable encoding for when it\u2019s too late to ask. ACM TOIS\u00a023(3), 299\u2013324 (2005)","journal-title":"ACM TOIS"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials\u00a03(4) (2000)","DOI":"10.1109\/COMST.2000.5340804"},{"issue":"3","key":"24_CR10","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1002\/(SICI)1098-240X(199706)20:3<269::AID-NUR9>3.0.CO;2-G","volume":"20","author":"J.S. Grant","year":"1997","unstructured":"Grant, J.S., Davis, L.L.: Selection and use of content experts in instrument development. Research in Nursing & Health\u00a020(3), 269\u2013274 (1997)","journal-title":"Research in Nursing & Health"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Hu, D., Wang, L., Zhou, Y., Zhou, Y., Jiang, X., Ma, L.: D-S evidence theory based digital image trustworthiness evaluation model. In: MINES 2009 (2009)","DOI":"10.1109\/MINES.2009.154"},{"issue":"2","key":"24_CR12","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: WWW 2003, pp. 640\u2013651 (2003)","DOI":"10.1145\/775152.775242"},{"issue":"1","key":"24_CR14","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/BF01440734","volume":"39","author":"J. Kohlas","year":"1994","unstructured":"Kohlas, J., Monney, P.A.: Theory of evidence - a survey of its mathematical foundations, applications and computational aspects. Mathematical Methods of Operations Research\u00a039(1), 35\u201368 (1994)","journal-title":"Mathematical Methods of Operations Research"},{"issue":"6","key":"24_CR15","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1097\/00006199-198611000-00017","volume":"35","author":"M. Lynn","year":"1986","unstructured":"Lynn, M.: Determination and quantification of content validity. Nursing Research\u00a035(6), 382 (1986)","journal-title":"Nursing Research"},{"key":"24_CR16","unstructured":"Ma, J., Abie, H., Skramstad, T., Nyg\u00e5rd, M.: Development and validation of requirements for evidential value for assessing trustworthiness of digital records over time. Journal of Information (to appear, 2011)"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Menezes, A., Oorschot, P., Vanstone, S. (eds.) Handbook of applied cryptography (1996)","DOI":"10.1201\/9781439821916"},{"key":"24_CR18","unstructured":"National Archives of Australia: Australian government recordkeeping metadata standard. Tech. rep (2008)"},{"key":"24_CR19","volume-title":"SSL and TLS: Designing and building secure systems.","author":"E. Rescorla","year":"2000","unstructured":"Rescorla, E.: SSL and TLS: Designing and building secure systems. Addison-Wesley Professional, Reading (2000)"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Sentz, K., Ferson, S.: Combination of evidence in dempster-shafer theory. Tech. rep. (2002)","DOI":"10.2172\/800792"},{"key":"24_CR21","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G. Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Sun, Y.L., Han, Z., Yu, W., Liu, K.: Attacks on trust evaluation in distributed networks. In: CISS 2006, pp. 1461\u20131466 (2006)","DOI":"10.1109\/CISS.2006.286695"},{"issue":"1-2","key":"24_CR23","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.mcm.2008.05.005","volume":"49","author":"D. Trcek","year":"2009","unstructured":"Trcek, D.: A formal apparatus for modeling trust in computing environments. Mathematical and Computer Modelling 49(1-2), 226\u2013233 (2009)","journal-title":"Mathematical and Computer Modelling"},{"issue":"2","key":"24_CR24","first-page":"85","volume":"7","author":"L.A. Zadeh","year":"1986","unstructured":"Zadeh, L.A.: A simple view of the dempster-shafer theory of evidence and its implication for the rule of combination. AI Magazine\u00a07(2), 85\u201390 (1986)","journal-title":"AI Magazine"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22200-9_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T19:53:45Z","timestamp":1637956425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22200-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642221996","9783642222009"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22200-9_24","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}